Linoma Software just announced their Android app that works in conjunction with their GoAnywhere products to secure all file transfers coming and going from Android mobile devices. This is great news for any company that is concerned with data security when many employees are using mobile devices in their workflow. Read more…
Linoma is hosting a free webinar about DB2 field level encryption (fieldprocs) on June 13th, 2013. For more information follow this link.
A summary of the event is:
Now you can quickly encrypt sensitive data on the IBM i including credit card numbers, social security numbers, birthdates, bank routing numbers and other confidential fields in your physical files and tables. DB2 Field Procedures (FieldProcs) in IBM i version 7.1 has greatly simplified field encryption, often without requiring any file or application changes.
Join us for this free webinar where we’ll discuss
- How Field Procedures (FieldProcs) work
- Tips and techniques for implementing FieldProcs
- How to restrict access to sensitive fields by user or group profile
- Masking techniques to show only partial values
- Potential gotchas and hurdles to look out for
- Proper key management and security controls to comply with PCI DSS
- Audit trails to satisfy compliance reporting requirements
During this webinar, you will also get a demonstration of Crypto Complete by Linoma Software’s technical team. Crypto Complete will automatically create and manage the FieldProcs needed for encrypting your database fields. Crypto Complete also includes the security controls, key management, and audit trails required to pass audits and meet privacy regulations.
In the battle to secure information, it helps to know a little bit about how it can be compromised. Using FTP is one way to expose critical vulnerabilities that can allow credentials to be hacked. However, these holes in security can also be easily closed if you know how.
How Hackers Discover Vulnerabilities
Here’s how hackers could access sensitive data sent via FTP. With the use of a “sniffing” tool, an attacker could intercept and log any data traveling across the network. This log can then be analyzed to look at the content that was sent across specific TCP ports like FTP (port 21), as well as the user ID and passwords used to log in to the FTP servers that may have been sent as clear text. Read more…
Financial Times has posted a video about the impact of the rules of data leaks. This underscores the critical issues of sending files unsecured.